DESIGN AND CONSTRUCTION OF A COMMUNITY SECURITY BREACH DETECTION AND MITIGATION SYSTEM
DOI:
https://doi.org/10.11113/jm.v47.501Keywords:
Intrusion detection, Security breach, Threat, Signals, Air raid sirenAbstract
Security of an arena is crucial as it measures the situation awareness and safety. Security breaches often lead to chaos and attacks that must be managed. This project addressed the development of an air raid siren system that is capable of alerting the public of impending danger. The necessary theory for establishing the basis for the work and the parameters for constructing the security system were considered. The communication within the security system network is wireless, the various stations were determined to be capable of communicating within a 100m radius. These stations that communicate with each other are the breach detection, base station, Ground Control Unit (GCU), and also, air raid siren sections. The first set of sensors detects the intrusion signal and sends the notification to the GCU and then from the GCU to the air raid siren. In this study, the threat is detected when an intruder breaches the monitored environment, an arena of about 600m as captured by ultrasonic sensors which detect motion within the perimeter of intrusion. This signal is transmitted by the NRF24L01 transmitter to the GCU and finally to the air raid siren as a warning of a breach. The microcontrollers that run the wireless transceivers were programmed to carry out specific tasks. The detection unit uses an ultrasonic sensor which sends and receives sound pulses. The time it takes for this to happen is 294μs with a power consumption of 1.52729W. The GCU takes 0.22729W of power while the air raid siren section takes 8.1729W. The air raid siren was traveled up to a distance of 300m. The results show the system design and implementation are quite reliable and can be mass-produced for the community.
References
Janockova, Z. 2016. Air Raid Sirens. Retrieved from Telegrafia: http://www.electronicsirens.com [Accessed: 7 February 2024]
Medlicott, M. (2022). Air Raid Sirens. Retrieved from HANSARD: https://hasard.parliament.uk.com[Accessed: 7 February 2024]
Kuligowski E.D, Kimball A, (2018). Alerting under Imminent Threat: Guidance on alerts issued by an outdoor siren and short message alerting systems. https://www.nist.gov/publications/alerting-under-imminent-threat-guidance-alerts-issuedoutdoor-siren-and-short-message
Pritzker J.B. (2023). Outdoor Warning System. https://www2.illinois.gov/ready/plan/Pages/Sirens.aspx [Accessed: 7 February 2024]
Alumona, L., Oranugo, C., & Eze, C., (2019). GSM-Based Smart Security System Using Arduino. IJARCCE. 8. 32-42. 10.17148/IJARCCE.2019.81005.
Matthews, V., Etinosa, N., Enefiok, P.,& Ogukah, P. (2018). Implementation of a Community Emergency Security Alert System. 3(6): 475-483.Thiri, N., Kyi Kyi, K., & Tin, N. (2022). Perimeter Intrusion Detective System using Arduino. Journal of Computer Science and Information Technologies 4(3): 45-50
Kanoujiya, A., Jha, r., Rayal, S., & Khan, A. (2020). Border Security System. International Research Journal of Engineering and Technology, 07(05), 3293 -3299.
Thiri, N., Kyi Kyi, K., & Tin, N. (2022). Perimeter Intrusion Detective System using Arduino. Journal of Computer Science and Information Technologies 4(3): 45-50
Umamaheswari., S. (2020). PIR Sensor-based security system. Ann Robot Automation 4(1): 022-024. DOI: https://dx.doi.org/10.17352/ara.000006
Parab, A., & Amol, J. (2015). Implementation of a Security system using a Microcontroller. Journal for Computer Science, 2950-2953.
Lubis, I., Rahmat, R., Prasetyo, H., & Faza, S. (2019). Andriod-Based RFID Implementation of Vehicle Raids Process Using Arduino. https://www.researchgate.net/publication.
Muncho, M (2017). Design and Construction of a remote-control switching device for household appliances application. Advances in Science, Technology and Engineering Systems Journal. 2. 154-164. 10.25046/aj020421.
Downloads
Published
How to Cite
Issue
Section
License
Copyright of articles that appear in Jurnal Mekanikal belongs exclusively to Penerbit Universiti Teknologi Malaysia (Penerbit UTM Press). This copyright covers the rights to reproduce the article, including reprints, electronic reproductions or any other reproductions of similar nature.